Security Intro Flashcards

1
Q

What are the four principles of security?

A
  • Confidentiality
  • Authentication
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the “Confidentiality” principle of security?

A

Only sender and intended receiver should understand the message contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the “Authentication” principle of security?

A

Sender and receiver want to confirm each other’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the “Integrity” principle of security?

A

Sender and receiver want to ensure that the message is not altered without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the “Availability” principle of security?

A

Services must be accessible and available to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four actions an intruder can take?

A
  • Eavesdrop: Intercept message
  • Impersonation: Can fake source address in packet
  • Hijacking: Take over ongoing connection by removing sender or receiver, inserting themselves in place
  • Denial of Service: prevent service from being used by others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does an encryption algorithm comprise of?

A
  • A method for encrypting the data
  • A method for decrypting the data
  • A secret key used in the decryption / encryption method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three methods for breaking an encryption scheme?

A
  • Ciphertext-only attack
  • Known-plaintext attack
  • Chosen-plaintext attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the Ciphertext-only attack

A
  • Intruder has ciphertext but not plaintext
  • Option 1: brute force, search through all keys
  • Option 2: statistical analysis (look for patterns)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the Known-Plaintext Attack

A

Intruder has some ciphertext with its plaintext, wants to break other ciphertexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the Chosen-Plaintext Attack

A

Intruder has the ability to encrypt any plaintext but doesn’t have the key for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly